CVE-2014-2210
CA ERwin Web Portal MIMM ProfileIconServlet Multiple Information Disclosure Vulnerabilities
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Multiple directory traversal vulnerabilities in CA ERwin Web Portal 9.5 allow remote attackers to obtain sensitive information, bypass intended access restrictions, cause a denial of service, or possibly execute arbitrary code via unspecified vectors.
Múltiples vulnerabilidades de salto de directorio en el portal web de CA ERwin 9.5 permiten a atacantes remotos obtener información sensible, evadir restricciones de acceso, causar una denegación de servicio o posiblemente ejecutar código arbitrario a través de vectores no especificados.
This vulnerability allows remote attackers to read arbitrary files on a system with vulnerable installations of CA ERwin Web Portal's Meta Integration Metadata Management service. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the "Meta Integration Web Server and Services" ProfileIconServlet which is vulnerable to directory traversals in multiple parameters. An attacker can leverage these vulnerabilities to read arbitrary files, including files which store database credentials, under the context of SYSTEM. An attacker can couple this vulnerability with others to gain remote code execution.
CA Technologies Support is alerting customers to multiple vulnerabilities with CA Erwin Web Portal version 9.5. The vulnerabilities occur due to insufficient path verification. A remote unauthenticated attacker can use directory traversal attacks to gain sensitive information, cause a denial of service condition, gain additional access, or potentially execute arbitrary code.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2014-02-26 CVE Reserved
- 2014-04-03 CVE Published
- 2024-08-06 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/66644 | Vdb Entry | |
http://www.securitytracker.com/id/1030017 | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=%7B7F968A14-7407-4BCF-9EB1-EFE9F0E6D663%7D | 2015-08-13 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Ca Search vendor "Ca" | Erwin Web Portal Search vendor "Ca" for product "Erwin Web Portal" | 9.5 Search vendor "Ca" for product "Erwin Web Portal" and version "9.5" | - |
Affected
|